Sciweavers

931 search results - page 133 / 187
» Operating System Support for Process Confinement
Sort
View
COMPSAC
2009
IEEE
15 years 1 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
CHINZ
2005
ACM
14 years 11 months ago
Exploring sketch beautification techniques
Beautification of vague, imprecise sketchy ink input is an interesting area for exploration, especially with the emergence of pen-based systems, such as the Tablet PC. Fifty perce...
Beirong Wang, Jian Sun, Beryl Plimmer
JDWM
2008
97views more  JDWM 2008»
14 years 9 months ago
Seismological Data Warehousing and Mining: A Survey
Earthquake data composes an ever increasing collection of earth science information for post-processing analysis. Earth scientists, local or national administration officers and s...
Gerasimos Marketos, Yannis Theodoridis, Ioannis S....
PVLDB
2010
86views more  PVLDB 2010»
14 years 8 months ago
Thirteen New Players in the Team: A Ferry-based LINQ to SQL Provider
We demonstrate an efficient LINQ to SQL provider and its significant impact on the runtime performance of LINQ programs that process large data volumes. This alternative provider...
Tom Schreiber, Simone Bonetti, Torsten Grust, Manu...
TCOM
2010
110views more  TCOM 2010»
14 years 8 months ago
Joint data QR-detection and Kalman estimation for OFDM time-varying Rayleigh channel complex gains
—This paper deals with the case of a high speed mobile receiver operating in an orthogonal-frequency-divisionmultiplexing (OFDM) communication system. Assuming the knowledge of d...
Hussein Hijazi, Laurent Ros